<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Business Process Simulation: From Valid Models to Valuable Insights</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Robert Blümel</string-name>
          <email>robert.bluemel@sap.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Workshop</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>SAP Signavio</institution>
          ,
          <addr-line>Hasso-Plattner-Ring 7, 69190 Walldorf</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>UniVie Doctoral School Computer Science DoCS, University of Vienna</institution>
          ,
          <addr-line>Währinger Str. 29, 1090 Vienna</addr-line>
          ,
          <country country="AT">Austria</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Business process simulation (BPS) has traditionally relied on expert‐crafted models to anticipate process changes and support decision‐making. Recent data‑driven methods democratize BPS by automatically deriving simulation models from event logs, increasing accessibility to non-experts. However, this shift introduces two critical challenges: ensuring that automatically generated models are valid without modeling expertise, and providing analysis approaches that go beyond singular “what‑if” runs to surface deeper process insights. This doctoral project tackles these challenges through two complementary streams. First, we establish foundations for valid simulation by systematically reviewing existing validation practices and identifying threats to internal validity in common data‑driven research methods. Second, we leverage these validated models to develop approaches for quantifying process robustness and translating simulation outputs into actionable explanations. Together, these contributions aim to make data‑driven BPS more valid and insightful, advancing its practical utility for strategic decision support. This paper outlines the four interrelated research goals of this doctoral project covering the two streams, related research activities addressing these goals, and current progress.</p>
      </abstract>
      <kwd-group>
        <kwd>Process mining</kwd>
        <kwd>Business process simulation</kwd>
        <kwd>Data-driven simulation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Business process simulation (BPS) is a valuable tool for supporting decision-making in organizations [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
BPS refers to the abstraction of business processes into executable simulation models that allow for
the generation of numerous synthetic process instances. By simulating how a process behaves under
diferent conditions, BPS enables the analysis of potential changes without implementing them in
reality [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. This allows organizations to anticipate outcomes, reduce risks and costs associated with
process changes, and support continuous improvement and innovation [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. While BPS traditionally
required substantial manual modeling efort [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], recent years have seen the emergence of data-driven
approaches that derive simulation models from historical event data [
        <xref ref-type="bibr" rid="ref4 ref5 ref6 ref7 ref8 ref9">4, 5, 6, 7, 8, 9</xref>
        ]. These advances
have improved simulation accuracy and reduced the entry barrier for applying simulation, thereby
enabling broader adoption beyond expert users.
      </p>
      <p>
        Despite this democratization, BPS remains primarily limited to low‑stakes experimentation rather
than driving strategic, high‑impact decision-making [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Two key requirements to make data-driven
BPS more usable are only partially met by current research. First, the validity of the simulation models
needs to be ensured. A previously widely used technique to validate simulation models relied on expert
judgment [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. However, with the growing use of data-driven techniques and the involvement of users
with less modeling and domain expertise, alternative and more automatable validation approaches are
required [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Second, users need better support for using simulation to gain deeper insights. While
traditional BPS often focused on answering singular “what-if” questions, the increased accessibility of
simulation enables users to explore deeper insights and make sense of complex simulation behavior.
Prior eforts have explored ways to improve and ensure BPS model validity by proposing new
evaluation methods [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ]. Furthermore, usability through more advanced analysis methods based on
      </p>
      <p>CEUR</p>
      <p>
        ceur-ws.org
simulation [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ]. However, there is still a limited understanding of how BPS tools can be ensured to
be valid and insightful to drive adoption further.
      </p>
      <p>With this doctoral project1, we aim to strengthen this understanding. To do this, we structure the
project into two complementary focus areas, each targeting one of the above requirements and together
ensuring that data‑driven BPS becomes both valid and insightful:
Validation focus: The first focus area concentrates on establishing the foundations for valid simulation
models. We critically review existing validation practices of agent-based simulation models due to
the agent focus of the larger doctoral project. Furthermore, we evaluate whether newly proposed
data-driven practices actually provide the level of validity they are intended to ensure.</p>
      <p>RG1 Validation Practices: Systematically review and classify validation methods for agent‑based and
data‑driven BPS models, establishing a comprehensive understanding of existing methods.
RG2 Validity Threats: Identify and categorize internal validity threats in the commonly applied
research method to build accurate data-driven BPS models.</p>
      <p>Insight focus: The second focus area builds on these validated models to develop novel analysis
approaches that make simulation more insightful in practice. By proposing new approaches that make
use of validated simulation outputs, we aim to support deeper, data-driven insights into the behavior
and robustness of business processes. We aim to achieve this by using simulation to assess the processes’
robustness and explain such findings.</p>
      <p>RG3 Process Robustness: Develop a simulation‑based approach to measure how key performance
indicators respond to systematic parameter changes, supporting process robustness analysis.
RG4 Explainability: Develop an approach that translates complex simulation outputs into clear,
actionable explanations, helping users understand the drivers behind observed results.
By first ensuring that models are valid (RG1–RG2) and then providing tools for deeper insights
(RG3–RG4), this project ensures that data‑driven BPS becomes both valid and insightful for strategic
decision support.</p>
      <p>The remainder of this description of the intended doctoral project is structured as follows. Section 2
provides related work on the analysis of simulation results. Section 3 gives an overview of the current
state of the project and the research plan. Section 4 concludes the paper with an outlook.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Work</title>
      <p>In this section, we provide a concise overview of the literature on both focus areas—validating
datadriven BPS models and gaining insights from them—and describe how the doctoral project relates to
this research.</p>
      <p>
        Validity of BPS models. Research related to RG1 and RG2 primarily addresses validating BPS
approaches through evaluation. This process involves estimating how accurately a simulation approach
reflects certain process dimensions, such as control-flow, which is crucial for a more informed use of
BPS. This has been done for individual approaches [
        <xref ref-type="bibr" rid="ref16 ref4">4, 16</xref>
        ] or comparing diferent ones [
        <xref ref-type="bibr" rid="ref17 ref6">17, 6</xref>
        ]. Recently,
two evaluation frameworks were proposed to assess the quality of simulation models. To achieve that,
one framework compares simulated processes with historical data for various process dimensions [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ],
to provide deeper insight into the simulation model’s quality. Another framework focuses on evaluating
the quality of simulated processes by assessing their efectiveness in predictive process monitoring
tasks, comparing the performance of models trained on simulated data with those trained on real
data [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. In addition, an initial validation of a “what-if” module of a simulation approach has been
proposed [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], giving a first indication of how well the simulation under varying simulation parameters
works. These eforts partially address both RG1 and RG2. However, as we show in our work described
in Section 3.2, current methods have deficiencies that do not always allow users to rely on them. Under
which conditions this is the case remains to be identified.
1Robert Blümel is part of a joint project of SAP Signavio, Prof. Van der Aa (University of Vienna), Prof. Stuckenschmidt
(University of Mannheim), and a doctoral student, supervised by Prof. Stuckenschmidt. The project’s main focus lies on
agent-based business process simulation.
      </p>
      <p>
        Insights from data-driven BPS. While validation research has made significant strides, work on
drawing deeper insights from data‑driven BPS is still emerging. Some studies embed simulation within
broader process analytics to support end‑to‑end analyses [
        <xref ref-type="bibr" rid="ref10 ref18 ref19 ref20">10, 18, 19, 20</xref>
        ], but these require extensive
system integration. Others improve usability by ofering interactive scenario building [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] or by
applying optimization strategies for parameter tuning and resource allocation [
        <xref ref-type="bibr" rid="ref15 ref21 ref22">15, 21, 22</xref>
        ]. These
eforts demonstrate the value of simulation beyond singular what‑if runs and demonstrate simulation’s
potential for insight in democratized settings, as planned in our RG3. Yet, they typically focus on
individual parameter adjustments, rather than on systematically assessing how multiple factors interact
or on quantifying model sensitivity.
      </p>
      <p>
        Research related to RG4 remains restricted to general explainability methods. In the field of artificial
intelligence applications, various explainability methods exist that are becoming more prominent and
sophisticated (see, e.g., [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]). In addition to those general methods, approaches such as the discovery of
causal dependencies from event logs [24] could serve as a basis for explainability in the field of BPS.
However, despite these advances, no research has been proposed to leverage these or other approaches
to further explain BPS results.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Current State and Research Plans</title>
      <p>Building on the two complementary focus areas—establishing model validity and enabling deeper
insights—this doctoral project is currently organized into three active research streams, each
corresponding to one of the first three research goals. The first stream (RG1) conducts a systematic literature
review to map out existing validation practices for agent‑based and data‑driven BPS models; the second
stream (RG2) investigates and mitigates threats to internal validity in data‑driven workflows; and
the third stream (RG3) develops a simulation‑based approach for assessing process robustness under
systematic variation. For each of these streams, we outline the specific problem being targeted, our
contributions toward overcoming it, and its current state.</p>
      <sec id="sec-3-1">
        <title>3.1. Validation of Agent-based Simulation Models</title>
        <p>
          As a first work stream, this doctoral project contributes to a broader systematic literature review (SLR) on
agent-based modeling and simulation (ABMS) in the context of collaborative business processes. ABMS
is increasingly recognized as a suitable paradigm for simulating business processes, particularly due to
its ability to model complex interactions among autonomous agents and capture emergent behavior in
decentralized systems [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. These characteristics make it well-suited for representing organizational
dynamics, where local agent behaviors lead to global outcomes. The review investigates four core
areas: (i) conceptual modeling, (ii) the discovery of agents, (iii) architectural designs for agent-based
simulation models, and (iv) the validation of such models. While all four areas are explored as part of
the joint review, for this doctoral project, we specifically focus on the fourth area: the validation of
agent-based simulation models in order to gain an understanding of previous methods (RG1).
Problem. Despite the recognized potential of ABMS in simulating business processes, a significant gap
remains in the literature concerning an overview of the validation of agent-based simulation models.
Validation is crucial to ensure these models accurately represent real-world systems. Understanding
validation methods is essential to addressing RQ1, as it reveals what insights can be drawn from
simulated logs regarding a model’s accuracy in real-world processes. While two recent SLRs have begun
to explore ABMS in relation to process mining [25, 26], their focus is narrowly confined to process
mining contexts, lacking a broader perspective on ABMS applications in business process management.
As a result, related literature that does not explicitly employ process mining techniques needs to be
reviewed, providing a more comprehensive understanding of ABMS validation for business processes.
Contribution. To address these gaps, we undertake the following:
1. Conceptual goals clarification. We examine the goal of validation within ABMS.
2. Technique classification. We collect and classify the validation techniques used, referencing
        </p>
        <p>
          Sargent’s technique overview [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
3. Quantification analysis. We analyze how validation outcomes are quantified, focusing on
commonly used metrics and their input and scope.
        </p>
        <p>These objectives define the specific contribution of this doctoral work within the larger review efort.
Current state. The SLR is currently in progress, following Kitchenham’s [27] methodology for
conducting literature reviews. The study planning has been completed, and the study execution phase is
nearing completion. After applying inclusion and exclusion criteria to a pool of nearly 1,700 deduplicated
papers, 89 were identified as relevant to our research questions.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Threats to the Validity of Data-driven Business Process Simulation</title>
        <p>
          The second work stream of this doctoral project focuses on investigating threats to validity in BPS to
address RG2. As previously discussed, BPS facilitates what-if analyses for organizations, allowing them
to foresee the impacts of potential changes on their processes [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. Hence, organizations rely on a certain
quality in their simulation model and the assessment as to whether the simulation model actually has
this quality. To arrive at this assessment, typically, data-driven approaches streamline model creation
and evaluation through a structured six-step method using historical event data [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ], However, this
method can introduce systematic errors that bias evaluation results and distort confidence in simulation
model quality.
        </p>
        <p>
          Problem. This work addresses threats to internal validity in this six-step method. A method is internally
valid when changes in the observed outcomes are a direct result of the manipulations within the method
itself, rather than external factors [28]. Hence, internal validity is compromised when factors beyond the
intended scope of a method afect the observed outcomes, introducing systematic errors in evaluation
results [29]. In BPS, maintaining internal validity means that evaluation results must solely reflect the
algorithm’s true quality, uninfluenced by factors such as concept drift or data leakage. Such influences
can lead to incorrect assessments of a model’s capacity to accurately simulate real-world processes.
Contribution. To address this challenge, we make the following threefold contribution:
1. Method explication. We explicate the six-step research method as an object of study, clearly
defining its entities, relationships, and procedural decisions. This follows Frank’s definition,
which states that a research method includes both terminology and a corresponding process [30].
2. Threat identification. We identify five concrete threats to internal validity, illustrating each
with empirical examples drawn from public event logs [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ].
3. Best practices. We propose five best practices to mitigate these threats, thereby enhancing the
validity of simulation assessments and supporting informed business process and IS redesign.
These contributions aim to improve the validity of BPS, thereby addressing RG2 by ensuring that the
insights gained from simulation models are accurate and not distorted by threats to internal validity.
Current State. Currently, we await peer reviews for this research stream following a journal submission.
Prior to this, the project underwent two conference submissions and was rejected, primarily due to
methodological critiques. In response, we undertook revisions to strengthen both the methodological
foundation and empirical validation.
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Process Robustness: A Simulation-based Robustness Assessment Approach</title>
        <p>
          When analyzing their processes to identify areas for further improvement, organizations can draw
on a wide range of process analysis techniques. Conformance checking compares the observed as‑is
behavior against a reference model to pinpoint deviations [31]. These deviations then guide structural
or behavioral adaptations—such as increasing flexibility to better handle variability [ 32]. Simulation
further extends these analyses by allowing practitioners to evaluate process performance under diferent
configurations [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]. Complementing this, resilience analysis examines how well a process tolerates
short‑term shocks in parameters like arrival rates or resource availability [33].
        </p>
        <p>
          In practice, process changes are guided by specific performance targets—most notably key
performance indicators (KPIs) such as cycle time thresholds. Although simulation can be used to compare
varying simulation parameters with respect to these KPIs, users lack insight into how far each parameter
can be varied before KPI targets are violated. Prior work has enhanced simulation with interactive
scenario building [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] and optimization‑based parameter tuning [
          <xref ref-type="bibr" rid="ref15 ref21 ref22">15, 21, 22</xref>
          ], yet no existing method
systematically uncovers the limits within which parameter changes remain viable. Consequently,
businesses remain uncertain both about where there is room for improvement and about where further
adjustments will breach KPI constraints.
        </p>
        <p>To close this gap, we develop a simulation‑based approach to assess process robustness—the ability
of a process to maintain KPI compliance under systematic parameter variation. Drawing on robustness
concepts from manufacturing [34] and bioprocess engineering [35], we define robustness as the capacity
of a process to tolerate changes in key parameters without breaching specified KPI limits. This directly
addresses RG3 by equipping users with structured insights into their process’s tolerance to change.
Specifically, our contribution aims to:
1. Formalize process robustness. Identify the intervals for each parameter (e.g., arrival rate, task
duration, resource count) within which all KPI targets remain satisfied.
2. Implement adaptive exploration. Use a gradient‑based search to eficiently navigate the
high‑dimensional parameter space.
3. Generate semifactual reports. Translate findings into human‑readable semifactual statements
such as, “Even if arrival rate increases by up to 15%, average cycle time remains below 48 hours.”
Together, these contributions ensure that simulation results do not merely predict outcomes under
ifxed settings but also reveal the boundaries of safe change, thereby making simulation outputs more
actionable for risk‑aware decision‑making.</p>
        <p>Current state. This work is currently under development. Following the algorithm engineering
methodology by Mendling et al. [28], we have identified the real-world problem as well as the algorithmic
task. Based on that, we are currently in the algorithm design phase.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Outlook</title>
      <p>This doctoral project aims to advance business process simulation (BPS) by addressing key challenges
that have emerged from its growing democratization through data-driven approaches. In particular, it
focuses on two focus areas: ensuring that simulation models are valid and supporting their efective
use for gaining actionable process insights.</p>
      <p>Initial work has begun to address this on three research streams. First, a systematic literature review
is underway to examine validation techniques for agent-based simulation models, with data extraction
currently in progress (RG1). Second, we have identified five threats to the internal validity of data-driven
BPS evaluation methods and proposed corresponding mitigation practices; this work is currently being
revised for journal submission (RG2). Third, we are designing an approach to use simulation capabilities
to assess process robustness to derive more insights from various simulation scenarios (RG4).</p>
      <p>Future work will extend the project by adding a fourth research stream with a stronger emphasis
on explainability (RG4). This stream aims to develop an approach to make simulation outputs more
transparent and interpretable to support the adoption of insights in practice. This includes investigating
how contributing factors to simulation outcomes can be made more transparent to support a valid and
more informed use of the gained insights.</p>
    </sec>
    <sec id="sec-5">
      <title>Declaration of generative AI</title>
      <p>During the preparation of this work, the authors used ChatGPT in order to improve the readability and
language of the manuscript. After using this service, the authors reviewed and edited the content as
needed and take full responsibility for the content of the published article.
[24] Z. D. Bozorgi, I. Teinemaa, M. Dumas, M. La Rosa, A. Polyvyanyy, Process mining meets causal
machine learning: Discovering causal rules from event logs, in: ICPM, IEEE, 2020, pp. 129–136.
[25] F. Bukhsh, R. Govers, R. Bemthuis, M. Iacob, Exploring the integration of agent-based modelling,
process mining, and business process management through a text analytics–based literature review,
in: The Oxford Handbook of Agent-based Computational Management Science, Oxford University
Press, 2024.
[26] R. H. Bemthuis, S. Lazarova-Molnar, Towards integrating process mining with agent-based
modeling and simulation: State of the art and outlook, Expert Systems with Applications 281
(2025) 127571.
[27] B. Kitchenham, S. Charters, et al., Guidelines for performing systematic literature reviews in
software engineering version 2.3, Engineering 45 (2007) 1051.
[28] J. Mendling, H. Leopold, H. Meyerhenke, B. Depaire, Methodology of algorithm engineering, arXiv
(2023).
[29] P. Swanborn, A common base for quality control criteria in quantitative and qualitative research,</p>
      <p>Quality and quantity 30 (1996) 19–35.
[30] U. Frank, Towards a pluralistic conception of research methods in information systems research,</p>
      <p>ICB-Research Report 7, Universität Duisburg-Essen, 2006.
[31] W. van der Aalst, Process Mining: Data Science in Action, Springer, Berlin Heidelberg, 2016.
[32] H. Schonenberg, R. Mans, N. Russell, N. Mulyar, W. van der Aalst, Process flexibility: A survey
of contemporary approaches, in: International Workshop on Cooperation and Interoperability,
Architecture and Ontology, Springer, 2008, pp. 16–30.
[33] A. Kraus, J.-R. Rehse, H. van der Aa, Data-driven assessment of business process resilience, Process</p>
      <p>Science 1 (2024) 4.
[34] N. Stricker, G. Lanza, The concept of robustness in production systems and its correlation to
disturbances, Procedia CIRP 19 (2014) 87–92.
[35] L. Becker, J. Sturm, F. Eiden, D. Holtmann, Analyzing and understanding the robustness of
bioprocesses, Trends in Biotechnology 41 (2023) 1013–1026.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Rosa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mendling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Reijers</surname>
          </string-name>
          , Fundamentals of business process management, Springer,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>W.</given-names>
            <surname>Van der Aalst</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Nakatumba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rozinat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Russell</surname>
          </string-name>
          , Business process simulation,
          <source>Handbook on Business Process Management</source>
          <volume>1</volume>
          :
          <string-name>
            <surname>Introduction</surname>
            ,
            <given-names>Methods,</given-names>
          </string-name>
          <source>and Information Systems</source>
          (
          <year>2010</year>
          )
          <fpage>313</fpage>
          -
          <lpage>338</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J.</given-names>
            <surname>Banks</surname>
          </string-name>
          , Handbook of simulation: principles, methodology, advances, applications, and practice, John Wiley &amp; Sons,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Camargo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>González-Rojas</surname>
          </string-name>
          ,
          <source>Automated discovery of business process simulation models from event logs</source>
          ,
          <source>Decision Support Systems</source>
          <volume>134</volume>
          (
          <year>2020</year>
          )
          <fpage>113284</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Camargo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Báron</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>González-Rojas</surname>
          </string-name>
          ,
          <article-title>Learning business process simulation models: a hybrid process mining and deep learning approach</article-title>
          ,
          <source>Information Systems</source>
          <volume>117</volume>
          (
          <year>2023</year>
          )
          <fpage>102248</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>F.</given-names>
            <surname>Meneghello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Di Francescomarino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Ghidini</surname>
          </string-name>
          ,
          <article-title>Runtime integration of machine learning and simulation for business processes</article-title>
          , in: ICPM, IEEE,
          <year>2023</year>
          , pp.
          <fpage>9</fpage>
          -
          <lpage>16</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>O.</given-names>
            <surname>López-Pintado</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Berx</surname>
          </string-name>
          , Discovery, simulation, and
          <article-title>optimization of business processes with diferentiated resources</article-title>
          ,
          <source>Information Systems</source>
          <volume>120</volume>
          (
          <year>2024</year>
          )
          <fpage>102289</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>O.</given-names>
            <surname>López-Pintado</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <article-title>Business process simulation: Probabilistic modeling of intermittent resource availability and multitasking behavior</article-title>
          ,
          <source>Information Systems</source>
          <volume>127</volume>
          (
          <year>2025</year>
          )
          <fpage>102471</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>L.</given-names>
            <surname>Kirchdorfer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Blümel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Kampik</surname>
          </string-name>
          , H. van der Aa, H. Stuckenschmidt,
          <article-title>Discovering multi-agent systems for resource-centric business process simulation</article-title>
          ,
          <source>Process Science</source>
          <volume>2</volume>
          (
          <year>2025</year>
          )
          <article-title>4</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>T.</given-names>
            <surname>Kampik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Warmuth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rebmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Agam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. N.</given-names>
            <surname>Egger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gerber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hofart</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kolk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Herzig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Decker</surname>
          </string-name>
          , et al.,
          <article-title>Large process models: a vision for business process management in the age of generative ai</article-title>
          , KI-Künstliche
          <string-name>
            <surname>Intelligenz</surname>
          </string-name>
          (
          <year>2024</year>
          )
          <fpage>1</fpage>
          -
          <lpage>15</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>R. G.</given-names>
            <surname>Sargent</surname>
          </string-name>
          ,
          <article-title>Verification and validation of simulation models</article-title>
          ,
          <source>Journal of simulation 7</source>
          (
          <year>2013</year>
          )
          <fpage>12</fpage>
          -
          <lpage>24</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>D.</given-names>
            <surname>Chapela-Campa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Benchekroun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Baron</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Krass</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Senderovich</surname>
          </string-name>
          ,
          <article-title>A framework for measuring the quality of business process simulation models</article-title>
          ,
          <source>Information Systems</source>
          <volume>127</volume>
          (
          <year>2025</year>
          )
          <fpage>102447</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>K.</given-names>
            <surname>Özdemir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kirchdorfer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Amiri Elyasi</surname>
          </string-name>
          , H. van der Aa, H. Stuckenschmidt,
          <article-title>Rethinking business process simulation: A utility-based evaluation framework</article-title>
          ,
          <source>in: BPM Forum</source>
          , Springer,
          <year>2025</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>D.</given-names>
            <surname>Barón-Espitia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. G.</given-names>
            <surname>Rojas</surname>
          </string-name>
          , Coral:
          <article-title>Conversational what-if process analysis</article-title>
          ,
          <source>in: ICPM Doctoral Consortium/Demo</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>118</fpage>
          -
          <lpage>122</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>O.</given-names>
            <surname>López-Pintado</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Rosenbaum</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Berx</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <article-title>Optimos: A tool for simulation-driven business process optimization (</article-title>
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>M.</given-names>
            <surname>Camargo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>González-Rojas</surname>
          </string-name>
          ,
          <article-title>Learning accurate LSTM models of business processes</article-title>
          ,
          <source>in: BPM</source>
          , Springer,
          <year>2019</year>
          , pp.
          <fpage>286</fpage>
          -
          <lpage>302</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>M.</given-names>
            <surname>Camargo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>González-Rojas</surname>
          </string-name>
          ,
          <article-title>Discovering generative models from event logs: data-driven simulation vs deep learning</article-title>
          ,
          <source>PeerJ Computer Science</source>
          <volume>7</volume>
          (
          <year>2021</year>
          )
          <article-title>e577</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Fournier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Limonad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Marrella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Montali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.-R.</given-names>
            <surname>Rehse</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Accorsi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Calvanese</surname>
          </string-name>
          , G. De Giacomo,
          <string-name>
            <given-names>D.</given-names>
            <surname>Fahland</surname>
          </string-name>
          , et al.,
          <article-title>Ai-augmented business process management systems: a research manifesto</article-title>
          ,
          <source>ACM Transactions on Management Information Systems</source>
          <volume>14</volume>
          (
          <year>2023</year>
          )
          <fpage>1</fpage>
          -
          <lpage>19</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>D.</given-names>
            <surname>Chapela-Campa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <article-title>From process mining to augmented process execution</article-title>
          ,
          <source>Software and Systems Modeling</source>
          <volume>22</volume>
          (
          <year>2023</year>
          )
          <fpage>1977</fpage>
          -
          <lpage>1986</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tour</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Polyvyanyy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kalenkova</surname>
          </string-name>
          ,
          <article-title>Agent system mining: Vision, benefits, and challenges</article-title>
          ,
          <source>IEEE Access 9</source>
          (
          <year>2021</year>
          )
          <fpage>99480</fpage>
          -
          <lpage>99494</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>J.</given-names>
            <surname>Bejarano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Barón</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>González-Rojas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Camargo</surname>
          </string-name>
          ,
          <article-title>Discovering optimal resource allocations for what-if scenarios using data-driven simulation</article-title>
          ,
          <source>Frontiers in Computer Science</source>
          <volume>5</volume>
          (
          <year>2023</year>
          )
          <fpage>1279800</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>O.</given-names>
            <surname>López-Pintado</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Yerokhin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. M.</given-names>
            <surname>Maggi</surname>
          </string-name>
          ,
          <article-title>Silhouetting the cost-time front: Multiobjective resource optimization in business processes</article-title>
          ,
          <source>in: BPM Forum</source>
          , Springer,
          <year>2021</year>
          , pp.
          <fpage>92</fpage>
          -
          <lpage>108</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>W.</given-names>
            <surname>Ding</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Abdel-Basset</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Hawash</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Ali</surname>
          </string-name>
          ,
          <article-title>Explainability of artificial intelligence methods, applications and challenges: A comprehensive survey</article-title>
          ,
          <source>Information Sciences 615</source>
          (
          <year>2022</year>
          )
          <fpage>238</fpage>
          -
          <lpage>292</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>